Debugging password exposure
Posted: Wed Jul 11, 2018 2:32 pm
Hello everyone,
I had my OD admin account and all the MySQL root accounts on the same password.
The other day a 3rd party service (a clearinghouse) was debugging one of their client utilities remotely on our computers and then I noticed days later that the dev had left some debug notes on a sticky note on the desktop which included the MySQL root and OD admin account password.
I thought I would start here before I asked the clearinghouse support, but where was it possible that my password was served up in cleartext? Does OD save passwords in the db in cleartext? Is the MySQL root password sent from the OD client to the database in cleartext? Are devs with knowledge of OD able to get the root password via the hash stored at FreeDentalConfig.xml?
Thanks!
I had my OD admin account and all the MySQL root accounts on the same password.
The other day a 3rd party service (a clearinghouse) was debugging one of their client utilities remotely on our computers and then I noticed days later that the dev had left some debug notes on a sticky note on the desktop which included the MySQL root and OD admin account password.
I thought I would start here before I asked the clearinghouse support, but where was it possible that my password was served up in cleartext? Does OD save passwords in the db in cleartext? Is the MySQL root password sent from the OD client to the database in cleartext? Are devs with knowledge of OD able to get the root password via the hash stored at FreeDentalConfig.xml?
Thanks!